iommu/vt-d: Allow PCI sub-hierarchy to use DMA domain
authorLu Baolu <baolu.lu@linux.intel.com>
Wed, 6 May 2020 01:59:46 +0000 (09:59 +0800)
committerJoerg Roedel <jroedel@suse.de>
Wed, 13 May 2020 10:02:01 +0000 (12:02 +0200)
commit14b3526d5909f01e1d1baa05f50952788bb7418e
tree7e12489472dd572b17ffa0bc2f807328def30698
parent327d5b2fee91c404a3956c324193892cf2cc9528
iommu/vt-d: Allow PCI sub-hierarchy to use DMA domain

Before commit fa954e6831789 ("iommu/vt-d: Delegate the dma domain
to upper layer"), Intel IOMMU started off with all devices in the
identity domain, and took them out later if it found they couldn't
access all of memory. This required devices behind a PCI bridge to
use a DMA domain at the beginning because all PCI devices behind
the bridge use the same source-id in their transactions and the
domain couldn't be changed at run-time.

Intel IOMMU driver is now aligned with the default domain framework,
there's no need to keep this requirement anymore.

Signed-off-by: Lu Baolu <baolu.lu@linux.intel.com>
Tested-by: Daniel Drake <drake@endlessm.com>
Reviewed-by: Jon Derrick <jonathan.derrick@intel.com>
Reviewed-by: Jerry Snitselaar <jsnitsel@redhat.com>
Link: https://lore.kernel.org/r/20200506015947.28662-3-baolu.lu@linux.intel.com
Signed-off-by: Joerg Roedel <jroedel@suse.de>
drivers/iommu/intel-iommu.c